Previous Chapter: 1. Introduction
Suggested Citation: "2. High-Grade Threats and High-Value Targets." National Research Council. 2001. Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information. Washington, DC: The National Academies Press. doi: 10.17226/10197.
Page 3
Suggested Citation: "2. High-Grade Threats and High-Value Targets." National Research Council. 2001. Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information. Washington, DC: The National Academies Press. doi: 10.17226/10197.
Page 4
Suggested Citation: "2. High-Grade Threats and High-Value Targets." National Research Council. 2001. Summary of Discussions at a Planning Meeting on Cyber-Security and the Insider Threat to Classified Information. Washington, DC: The National Academies Press. doi: 10.17226/10197.
Page 5
Next Chapter: 3. Psychological, Social, Legal and Managerial Aspects of the Insider Threat
Subscribe to Email from the National Academies
Keep up with all of the activities, publications, and events by subscribing to free updates by email.